Security Reporting Sample Clauses

Security Reporting. If you’ve discovered a vulnerability in the Chargifi application, please report it to us at the email address noted below. Xxxxxxxx strives to stay on top of the latest security developments both internally and by working with third parties. We appreciate the community’s efforts in creating a more secure web. If you believe your account has been compromised or you are seeing suspicious activity on your account please report it immediately to xxxx-xxxxxxxx@xxxxxxxx.xxx.
AutoNDA by SimpleDocs
Security Reporting. Commencing no less than thirty (30) Days prior to the System Integration Date, and thereafter annually during the Term of this Agreement, Supplier shall deliver to Company evidence of Supplier’s information security safeguards, including but not limited to current ISO27001 reports, SSAE 16 SOC2 Type 2 reports and annual third-party penetration tests, within thirty (30) days of each such report’s completion, and any and all such other similar reports, as completed. Supplier shall, at no cost to Company, mitigate all critical and high-risk findings within ten (10) Days of receiving such findings and provide Company with evidence of such mitigation to the reasonable satisfaction of Company. Malware. Supplier will (consistent with the following sentence) ensure that no Malware or malicious software, or similar items are coded or introduced into any aspect of the Grid Services, the GSDS, the DERMS, and the Supplier information systems and operating environments and processes used or relied upon by Supplier to provide the Grid Services, including the information, data and other materials delivered by or on behalf of Supplier to Company, the customers of Company, Participants and/or third party providers (collectively, Environment). Supplier will continue to implement improvements to and upgrades of its Malware prevention and correction programs and processes consistent with the then‑current NIST technology industry’s standards and, in any case, no less robust than the programs and processes implemented by Supplier with respect to its own information systems and, on a regular basis as requested by Company, Supplier shall provide Company with sufficient evidence of the same. Supplier shall furthermore ensure that all Supplier Agents comply with the obligations of Supplier as set forth in this Section 27.1 (c) (Malware). If Malware is found to have been introduced into the Environment, Supplier will promptly notify Company, and Supplier shall take immediate action to eliminate and remediate the effects of the Malware at Supplier’s expense. Supplier shall not modify or otherwise take corrective action with respect to the Company Systems except at Company’s request. Supplier will promptly report to Company the nature and status of all security incidents, Malware detection, elimination and remediation efforts. On a regular basis as requested by the Company, Supplier shall provide Company with sufficient evidence of its efforts at continuous monitoring to evaluate the ...
Security Reporting. ‌ Design-Builder shall report all Security Incidents, emergencies, crimes in progress and Potential Incidents to the City and the applicable Emergency Services:
Security Reporting. COUNTY’s system administrator shall be able to report on user activity by logon ID. These reports shall contain details on user, date, time and type of access.
Security Reporting. In the event where the Client suspects any irregular activities or security activities, such reports should be emailed to xxxxxxxxxx@xxxxx0.xxx along with any supporting logs, screenshots, or proof of incident.
Security Reporting. Project Co shall report all Security Incidents, emergencies, crimes in progress and Potential Incidents to the City and the applicable Emergency Services:
Security Reporting. The Contractor must maintain and submit to the COTR or designee, as requested, reports that detail the following: • Incident ReportsKey Control Manifest • Custody and Destruction of Damaged Key Logs • Visitor Logs WASHINGTON METROPOLITAN AREA TRANSIT AUTHORITY SUPPLY AND SERVICE CONTRACT RFP-CQ16038/AMB Attachment# 2 WASHINGTON METROPOLITAN AREA TRANSIT AUTHORITY SUPPLY AND SERVICE CONTRACT RFP-CQ16038/AMB CQ16038 - Questions and Answers for the Armed Security Services
AutoNDA by SimpleDocs
Security Reporting. The contractor shall perform data analysis by functional area of the security program metrics to assess the health of security posture and provide a get well plan, to the Government Security Manager and/or Information Assurance Manager (IAM), as applicable, as well as the COR that clearly define roles, expectations, and measure of success. The contractor shall submit to the COR, within 24 hours, a copy of all security reports submitted to any Cognizant Security Activity (CSA), Cognizant Security Office (CSO), base Security Office, or other Federal authority under DoDM 5220.22 National Industrial Security Program Operating Manual (NISPOM) Chapter 1, Section 3. The contractor shall report security incidents IAW CDRL A011 Incident Report (DI-MGMT-82071).

Related to Security Reporting

  • Diversity Reporting Upon request, the Contractor will report to the Department its spend with business enterprises certified by the OSD. These reports must include the time period covered, the name and Federal Employer Identification Number of each business enterprise utilized during the period, commodities and contractual services provided by the business enterprise, and the amount paid to the business enterprise on behalf of each agency purchasing under the Contract.

  • Monthly Reporting Within twenty (20) calendar days following the end of each calendar month, Registry Operator shall deliver to ICANN reports in the format set forth in Specification 3 attached hereto (“Specification 3”).

  • Other Reporting Upon request, the School shall provide the Commission any other information determined by the Commission to be relevant to any term or condition of this Contract.

  • Additional Reporting 37. Within seven days after the date of this Agreement, the Recipient shall register in XXX.xxx, and thereafter maintain the currency of the information in XXX.xxx until at least October 1, 2022. The Recipient shall review and update such information at least annually after the initial registration, and more frequently if required by changes in the Recipient’s information. The Recipient agrees that this Agreement and information related thereto, including the Maximum Awardable Amount and any executive total compensation reported pursuant to paragraph 38, may be made available to the public through a U.S. Government website, including XXX.xxx.

  • Diversity Report The Contractor shall report to each Customer, spend with certified and other minority business enterprises. These reports shall include the period covered, the name, minority code and Federal Employer Identification Number of each minority business utilized during the period, Commodities provided by the minority business enterprise, and the amount paid to each minority business on behalf of each purchasing agency ordering under the terms of this Contract.

  • Project Reporting A summary of the Recipient’s performance against their agreed to deliverables and commitments as defined in the annual Regional Operations Plan and Budget during the previous quarter.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Fault Reporting 5.1 We are responsible for correcting faults in supplying the Voice Services. You must provide all necessary assistance to enable us to locate and repair any fault which is our responsibility.

  • Information Reporting (a) The Fund agrees that, during the Current Special Rate Period and so long as BANA or any Affiliate thereof is the beneficial owner of any Outstanding VRDP Shares, it will deliver, or direct the Tender and Paying Agent to deliver, to BANA and any such Affiliate:

  • Quarterly Reporting Within 45 days after the close of the first three (3) quarterly periods of each of its respective fiscal years, to the extent not furnished under the Purchase Agreement, (A) consolidated balance sheets of Provider and its Subsidiaries as at the close of each such period and (B) consolidated statements of income and retained earnings and a statement of cash flows for Provider for the period from the beginning of such fiscal year to the end of such quarter, all certified by its respective chief financial officer or treasurer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!